Category Archives: Full Disclosure

Full Disclosure

New release: UFONet v0.8 – "U-NATi0n!"

Posted by psy on Oct 23

Hi,

I am glad to present a new release of this tool:

http://ufonet.03c8.net

UFONet abuses OSI Layer 7-HTTP to create/manage ‘zombies’ and to conduct
different attacks using; GET/POST, multithreading, proxies, origin
spoofing methods, cache evasion techniques, etc.

FAQ: http://ufonet.03c8.net/FAQ.html

———

– Added XML-RPC Pingback exploitation (WP, Drupal, etc…)
– Added AES256+HMAC-SHA1 messagery system
– Added Statistics…

Defense in depth — the Microsoft way (part 45): filesystem redirection fails to redirect the application directory

Posted by Stefan Kanthak on Oct 20

Hi @ll,

on x64 editions of Windows, RegEdit.exe exists both as
%windir%regedit.exe and %windir%SysWOW64regedit.exe.

<https://msdn.microsoft.com/en-us/library/aa384187.aspx> states

| […] whenever a 32-bit application attempts to access […]
| %windir%regedit.exe is redirected to %windir%SysWOW64regedit.exe.

But what is the “application directory” when a 32-bit application
runs %windir%regedit.exe?
Is it %windir% or…

Re: Critical Vulnerability in Ubiquiti UniFi

Posted by kvnjs on Oct 19

Tim conflates two products in his original report:

Product: UniFi AP AC Lite
Vendor: Ubiquiti Networks Inc.

Internal reference: ? (Bug ID)
Vulnerability type: Incorrect access control
Vulnerable version: Unify 5.2.7 and possible other versions affected (not
tested)

[…]

Both the UniFi appliance line and the AP management software are properly
spelled ‘UniFi’.

https://www.ubnt.com/unifi/unifi-ap-ac-lite/

Ubiquiti

Posted by Tim Schughart on Oct 19

Hi,

please let us communicate directly and not via Mailinglists, because this results in flooding and is not important to
all other people. If there is an final result, weather the PoC has got an mistake or not, we can publish the result.

If there are other products affected we don’t know – this was not mentioned in the disclosure (The PoC is only for the
OS X Software combined with an AP AC Lite), so we can’t give an statement to other…

Multiple Vulnerabilities in Plone CMS

Posted by Sebastian Perez on Oct 19

[Product Description]
Plone is a free and open source content management system built on
top of the Zope application server. Plone is positioned as an
“Enterprise CMS” and is most commonly used for intranets and as part
of the web presence of large organizations

[Systems Affected]
Product : Plone
Version : All supported Plone versions (4.3.11 and any earlier 4.x
version, 5.0.6 and any earlier 5.x version). Previous versions…

Ghostscript sadbox bypass lead ImageMagick to remote code execution

Posted by redrain root on Oct 19

recently I noticed Tavis Ormandy reporting a vulnerability about Ghostscript
-dSAFER mode could be ignored and lead to code execution, however no one
exploit it in a application. there is a simple discussion and exploit
about it.

Author: redrain, yu.hong () chaitin com
Date: 2016-10-17
Version: Ghostscript version > 1.6
ImageMagick(or other app) all version
Vendor Notified: 2016-10-18

ImageMagick allows to process files with…

Evernote for Windows DLL Loading Remote Code Execution

Posted by Himanshu Mehta on Oct 19

Aloha,

Summary
Evernote contains a DLL hijacking vulnerability that could allow an
unauthenticated, remote attacker to execute arbitrary code on the targeted
system. The vulnerability exists due to some DLL file is loaded by
‘Evernote_6.1.2.2292.exe’ improperly. And it allows an attacker to load
this DLL file of the attacker’s choosing that could execute arbitrary code
without the user’s knowledge.

Affected Product:
Evernote…

Defense in depth — the Microsoft way (part 44): complete failure of Windows Update

Posted by Stefan Kanthak on Oct 19

Hi @ll,

since more than a year now, Windows Update fails (not only, but most
notably) on FRESH installations of Windows 7/8/8.1 (especially their
32-bit editions), which then get NO security updates at all [°]!

One of the many possible causes: Windows Update Client runs out of
(virtual) memory during the search for updates and yields 0x8007000E
alias E_OUTOFMEMORY [‘].

According to <https://support.microsoft.com/en-us/kb/3050265>…

CVE-2016-7999: SPIP 3.1.2 Server Side Request Forgery

Posted by Sysdream Labs on Oct 19

## SPIP 3.1.2 Server Side Request Forgery (CVE-2016-7999)

### Product Description

SPIP is a publishing system for the Internet, which put importance on collaborative working, multilingual environments
and ease of use. It is free software, distributed under the GNU/GPL licence.

### Vulnerability Description

It’s possible to send HTTP/FTP requests using the `valider_xml` file.
Attackers can make it look like the server is sending the…